Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Vulnerability Assessment Details

SSH Insertion Attack

The remote SSH server contains a cryptographical weakness which might permit
a third party to decrypt the traffic.

Description :

The remote host is running a version of SSH which is older than (or as old as)
version 1.2.23.

The remote version of this software is vulnerable to a known plain text attack,
which may permit a possible hacker to insert encrypted packets in the client - server
stream that will be deciphered by the server, thus permiting the attacker to
execute arbitrary commands on the remote server